Cisco - Passit4sure.300 101.v2015!05!19.by - Robert.65q
Cisco - Passit4sure.300 101.v2015!05!19.by - Robert.65q
Number: 300-101
Passing Score: 800
Time Limit: 120 min
File Version: 7.6
http://www.gratisexam.com/
QUESTION 1
Refer to the exhibit.
A network administrator checks this adjacency table on a router. What is a possible cause for the
incomplete marking?
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 2
A network engineer notices that transmission rates of senders of TCP traffic sharply increase and decrease
simultaneously during periods of congestion. Which condition causes this?
A. global synchronization
B. tail drop
C. random early detection
D. queue management algorithm
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 3
Which three problems result from application mixing of UDP and TCP streams within a network with no
QoS? (Choose three.)
A. starvation
B. jitter
C. latency
D. windowing
E. lower throughput
QUESTION 4
Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single
connection during the migration process?
http://www.gratisexam.com/
A. dual-stack method
B. 6to4 tunneling
C. GRE tunneling
D. NAT-PT
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 5
Which statement about the use of tunneling to migrate to IPv6 is true?
Correct Answer: C
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 6
A network administrator executes the command clear ip route. Which two tables does this command clear
and rebuild? (Choose two.)
A. IP routing
B. FIB
C. ARP cache
D. MAC address table
E. Cisco Express Forwarding table
F. topology table
Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 7
Which switching method is used when entries are present in the output of the command show ip cache?
A. fast switching
B. process switching
C. Cisco Express Forwarding switching
D. cut-through packet switching
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 8
Which two actions must you perform to enable and use window scaling on a router? (Choose two.)
Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 9
Which three TCP enhancements can be used with TCP selective acknowledgments? (Choose three.)
A. header compression
B. explicit congestion notification
C. keepalive
D. time stamps
E. TCP path discovery
F. MTU window
Explanation/Reference:
QUESTION 10
A network administrator uses IP SLA to measure UDP performance and notices that packets on one router
have a higher one-way delay compared to the opposite direction. Which UDP characteristic does this
scenario describe?
A. latency
B. starvation
C. connectionless communication
D. nonsequencing unordered packets
E. jitter
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 11
Under which condition does UDP dominance occur?
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
QUESTION 12
Prior to enabling PPPoE in a virtual private dialup network group, which task must be completed?
Correct Answer: B
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
QUESTION 13
A network engineer has been asked to ensure that the PPPoE connection is established and authenticated
using an encrypted password. Which technology, in combination with PPPoE, can be used for
authentication in this manner?
A. PAP
B. dot1x
C. IPsec
D. CHAP
E. ESP
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
QUESTION 14
A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if no
interesting traffic exists. Which feature can be used to accomplish this task?
A. TCP Adjust
B. Dialer Persistent
C. PPPoE Groups
D. half-bridging
E. Peer Neighbor Route
Correct Answer: B
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
QUESTION 15
Which PPP authentication method sends authentication information in clear text?
A. MS CHAP
B. CDPCP
C. CHAP
D. PAP
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
QUESTION 16
Which protocol uses dynamic address mapping to request the next-hop protocol address for a specific
connection?
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
QUESTION 17
Which statement is true about the PPP Session Phase of PPPoE?
A. PPP options are negotiated and authentication is not performed. Once the link setup is completed,
PPPoE functions as a Layer 3 encapsulation method that allows data to be transferred over the PPP
link within PPPoE headers.
B. PPP options are not negotiated and authentication is performed. Once the link setup is completed,
PPPoE functions as a Layer 4 encapsulation method that allows data to be transferred over the PPP
link within PPPoE headers.
C. PPP options are automatically enabled and authorization is performed. Once the link setup is
completed, PPPoE functions as a Layer 2 encapsulation method that allows data to be encrypted over
the PPP link within PPPoE headers.
D. PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE
functions as a Layer 2 encapsulation method that allows data to be transferred over the PPP link within
PPPoE headers.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
QUESTION 18
PPPoE is composed of which two phases?
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
QUESTION 19
Refer to the exhibit.
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 20
A router with an interface that is configured with ipv6 address autoconfig also has a link-local address
assigned. Which message is required to obtain a global unicast address when a router is present?
A. DHCPv6 request
B. router-advertisement
C. neighbor-solicitation
D. redirect
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 21
An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the
router. The router has the following interface parameters:
A. 2001:DB8:0:1:C601:42FF:FE0F:7
B. 2001:DB8:0:1:FFFF:C601:420F:7
C. 2001:DB8:0:1:FE80:C601:420F:7
D. 2001:DB8:0:1:C601:42FE:800F:7
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 22
For security purposes, an IPv6 traffic filter was configured under various interfaces on the local router.
However, shortly after implementing the traffic filter, OSPFv3 neighbor adjacencies were lost. What caused
this issue?
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 23
What is the purpose of the autonomous-system {autonomous-system-number} command?
A. It sets the EIGRP autonomous system number in a VRF.
B. It sets the BGP autonomous system number in a VRF.
C. It sets the global EIGRP autonomous system number.
D. It sets the global BGP autonomous system number.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 24
What is the default OSPF hello interval on a Frame Relay point-to-point network?
A. 10
B. 20
C. 30
D. 40
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 25
Refer to the exhibit.
Which command only announces the 1.2.3.0/24 network out of FastEthernet 0/0?
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 26
Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24?
A. 10.9.1.0/24
B. 10.8.0.0/24
C. 10.8.0.0/16
D. 10.8.0.0/23
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
QUESTION 27
Router A and Router B are configured with IPv6 addressing and basic routing capabilities using OSPFv3.
The networks that are advertised from Router A do not show up in Router B's routing table. After debugging
IPv6 packets, the message "not a router" is found in the output. Why is the routing information not being
learned by Router B?
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
QUESTION 28
After you review the output of the command show ipv6 interface brief, you see that several IPv6 addresses
have the 16-bit hexadecimal value of "FFFE" inserted into the address. Based on this information, what do
you conclude about these IPv6 addresses?
A. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device.
B. The addresses were misconfigured and will not function as intended.
C. IPv6 addresses containing "FFFE" indicate that the address is reserved for multicast.
D. The IPv6 universal/local flag (bit 7) was flipped.
E. IPv6 unicast forwarding was enabled, but IPv6 Cisco Express Forwarding was disabled.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 29
A packet capture log indicates that several router solicitation messages were sent from a local host on the
IPv6 segment. What is the expected acknowledgment and its usage?
A. Router acknowledgment messages will be forwarded upstream, where the DHCP server will allocate
addresses to the local host.
B. Routers on the IPv6 segment will respond with an advertisement that provides an external path from the
local subnet, as well as certain data, such as prefix discovery.
C. Duplicate Address Detection will determine if any other local host is using the same IPv6 address for
communication with the IPv6 routers on the segment.
D. All local host traffic will be redirected to the router with the lowest ICMPv6 signature, which is statically
defined by the network administrator.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 30
You have been asked to evaluate how EIGRP is functioning in a customer network.
What type of route filtering is occurring on R6
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 31
You have been asked to evaluate how EIGRP is functioning in a customer network.
Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?
A. CISCO
B. EIGRP
C. key
D. MD5
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 32
You have been asked to evaluate how EIGRP is functioning in a customer network.
What is the advertised distance for the 192.168.46.0 network on R1?
A. 333056
B. 1938688
C. 1810944
D. 307456
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 33
You have been asked to evaluate how EIGRP is functioning in a customer network.
What percent of R1's interfaces bandwidth is EIGRP allowed to use?
A. 10
B. 20
C. 30
D. 40
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 34
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer
has about its operation. The customer has disabled your access to the show running-config command.
How old is the Type 4 LSA from Router 3 for area 1 on the router R5 based on the output you have
examined?
A. 1858
B. 1601
C. 600
D. 1569
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 35
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer
has about its operation. The customer has disabled your access to the show running-config command.
Which of the following statements is true about the serial links that terminate in R3
A. The R1-R3 link needs the neighbor command for the adjacency to stay up
B. The R2-R3 link OSPF timer values are 30, 120, 120
C. The R1-R3 link OSPF timer values should be 10,40,40
D. R3 is responsible for flooding LSUs to all the routers on the network.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 36
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer
has about its operation. The customer has disabled your access to the show running-config command.
How many times was SPF algorithm executed on R4 for Area 1?
A. 1
B. 5
C. 9
D. 20
E. 54
F. 224
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 37
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer
has about its operation. The customer has disabled your access to the show running-config command.
Areas of Router 5 and 6 are not normal areas, inspect their routing tables and determine which statement is
true?
A. R5's Loopback and R6's Loopback are both present in R5's Routing table
B. R5's Loopback and R6's Loopback are both present in R6's Routing table
C. Only R5's loopback is present in R5's Routing table
D. Only R6's loopback is present in R5's Routing table
E. Only R5's loopback is present in R6's Routing table
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
4, VPN Technologies
QUESTION 38
A company has just opened two remote branch offices that need to be connected to the corporate network.
Which interface configuration output can be applied to the corporate router to allow communication to the
remote sites?
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
QUESTION 39
A network engineer executes the show crypto ipsec sa command. Which three pieces of information are
displayed in the output? (Choose three.)
Explanation/Reference:
QUESTION 40
Refer to the following output:
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
QUESTION 41
Which common issue causes intermittent DMVPN tunnel flaps?
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
QUESTION 42
Which encapsulation supports an interface that is configured for an EVN trunk?
A. 802.1Q
B. ISL
C. PPP
D. Frame Relay
E. MPLS
F. HDLC
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
QUESTION 43
Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.)
A. IP address
B. routing table
C. forwarding table
D. access control lists
E. NetFlow configuration
Explanation/Reference:
QUESTION 44
A user is having issues accessing file shares on a network. The network engineer advises the user to open
a web browser, input a prescribed IP address, and follow the instructions. After doing this, the user is able
to access company shares. Which type of remote access did the engineer enable?
A. EZVPN
B. IPsec VPN client access
C. VPDN client access
D. SSL VPN client access
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
QUESTION 45
Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and Cisco
Express Forwarding?
A. FlexVPN
B. DMVPN
C. GETVPN
D. Cisco Easy VPN
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
QUESTION 46
Which traffic does the following configuration allow?
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
QUESTION 47
For troubleshooting purposes, which method can you use in combination with the "debug ip packet"
command to limit the amount of output data?
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
QUESTION 48
Refer to the following access list.
A. A packet that matches access-list with the "log" keyword is Cisco Express Forwarding switched.
B. A packet that matches access-list with the "log" keyword is fast switched.
C. A packet that matches access-list with the "log" keyword is process switched.
D. A large amount of IP traffic is being permitted on the router.
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
QUESTION 49
Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the
routing table?
A. source address
B. destination address
C. router interface
D. default gateway
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
QUESTION 50
What are the three modes of Unicast Reverse Path Forwarding?
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
QUESTION 51
What does the following access list, which is applied on the external interface FastEthernet 1/0 of the
perimeter router, accomplish?
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log router (config)#access-list 101 deny
ip 192.168.0.0 0.0.255.255 any log router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log
router (config)#access-list 101 permit ip any any
router (config)#interface fastEthernet 1/0
router (config-if)#ip access-group 101 in
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
QUESTION 52
Refer to the following command:
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
QUESTION 53
A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53, and 49 to
172.20.14.225. Which command should be applied to the configuration to allow this?
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
QUESTION 54
A network engineer is configuring SNMP on network devices to utilize one-way SNMP notifications.
However, the engineer is not concerned with authentication or encryption. Which command satisfies the
requirements of this scenario?
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 55
When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication?
A. username
B. password
C. community-string
D. encryption-key
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 56
After a recent DoS attack on a network, senior management asks you to implement better logging
functionality on all IOS-based devices. Which two actions can you take to provide enhanced logging
results? (Choose two.)
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 57
A network engineer finds that a core router has crashed without warning. In this situation, which feature can
the engineer use to create a crash collection?
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 58
A network engineer is trying to implement broadcast-based NTP in a network and executes the ntp
broadcast client command. Assuming that an NTP server is already set up, what is the result of the
command?
A. It enables receiving NTP broadcasts on the interface where the command was executed.
B. It enables receiving NTP broadcasts on all interfaces globally.
C. It enables a device to be an NTP peer to another device.
D. It enables a device to receive NTP broadcast and unicast packets.
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 59
IPv6 has just been deployed to all of the hosts within a network, but not to the servers. Which feature allows
IPv6 devices to communicate with IPv4 servers?
A. NAT
B. NATng
C. NAT64
D. dual-stack NAT
E. DNS64
Correct Answer: C
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 60
A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for
performance gauging. Which type of statistics does the engineer see?
A. connectionless-oriented
B. service-oriented
C. connection-oriented
D. application-oriented
Correct Answer: C
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 61
A network engineer executes the "ipv6 flowset" command. What is the result?
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 62
A network engineer is asked to configure a "site-to-site" IPsec VPN tunnel. One of the last things that the
engineer does is to configure an access list (access-list 1 permit any) along with the command ip nat inside
source list 1 int s0/0 overload. Which functions do the two commands serve in this scenario?
A. The command access-list 1 defines interesting traffic that is allowed through the tunnel.
B. The command ip nat inside source list 1 int s0/0 overload disables "many-to-one" access for all devices
on a defined segment to share a single IP address upon exiting the external interface.
C. The command access-list 1 permit any defines only one machine that is allowed through the tunnel.
D. The command ip nat inside source list 1 int s0/0 overload provides "many-to-one" access for all devices
on a defined segment to share a single IP address upon exiting the external interface.
Correct Answer: D
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 63
A network engineer is notified that several employees are experiencing network performance related
issues, and bandwidth-intensive applications are identified as the root cause. In order to identify which
specific type of traffic is causing this slowness, information such as the source/destination IP and Layer 4
port numbers is required. Which feature should the engineer use to gather the required information?
A. SNMP
B. Cisco IOS EEM
C. NetFlow
D. Syslog
E. WCCP
Correct Answer: C
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 64
A company's corporate policy has been updated to require that stateless, 1-to-1, and IPv6 to IPv6
translations at the Internet edge are performed. What is the best solution to ensure compliance with this
new policy?
A. NAT64
B. NAT44
C. NATv6
D. NPTv4
E. NPTv6
Correct Answer: E
Section: Infrastructure Services
Explanation
Explanation/Reference:
QUESTION 65
Which two methods of deployment can you use when implementing NAT64? (Choose two.)
A. stateless
B. stateful
C. manual
D. automatic
E. static
F. functional
G. dynamic
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
http://www.gratisexam.com/